Sciweavers

319 search results - page 24 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
EUROCRYPT
2008
Springer
14 years 11 months ago
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. U...
Nishanth Chandran, Vipul Goyal, Amit Sahai
64
Voted
ICRA
2010
IEEE
145views Robotics» more  ICRA 2010»
14 years 8 months ago
A general Gaussian-mixture approach for range-only mapping using multiple hypotheses
— Radio signal-based localization and mapping is becoming more interesting as applications involving the collaboration between robots and static wireless devices are more common....
Fernando Caballero, Luis Merino, Aníbal Oll...
ICTIR
2009
Springer
15 years 4 months ago
The Quantum Probability Ranking Principle for Information Retrieval
Abstract. While the Probability Ranking Principle for Information Retrieval provides the basis for formal models, it makes a very strong assumption regarding the dependence between...
Guido Zuccon, Leif Azzopardi, Keith van Rijsbergen
UM
2005
Springer
15 years 3 months ago
Modeling Suppositions in Users' Arguments
During conversation, people often make assumptions or suppositions that are not explicitly stated. Failure to identify these suppositions may lead to mis-communication. In this pap...
Sarah George, Ingrid Zukerman, Michael Niemann
RSKT
2010
Springer
14 years 8 months ago
Naive Bayesian Rough Sets
A naive Bayesian classifier is a probabilistic classifier based on Bayesian decision theory with naive independence assumptions, which is often used for ranking or constructing a...
Yiyu Yao, Bing Zhou